
SYSPWN
@syspwnx
SysPWN : A place to learn more about Vulnerability Research and make yourself ready for world-class hacking competitions
CVE-2025-59362 Squid Web Proxy Cache 7.1-VCS - snmp message processing stack based buffer-overflow github.com/Microsvuln/adv…
We released our Fuzzilli-based V8 Sandbox fuzzer: github.com/googleprojectz… It explores the heap to find interesting objects and corrupts them in a deterministic way using V8's memory corruption API. Happy fuzzing!
Prior to Pwn2Own Automotive 2024, ZDI posted a number of articles outlining the attack surfaces of the devices part of the competition. In the EV charger space compared to IVIs, there is quite limited public research although this has been changing recently.…
The top skill a vulnerability researcher can have is persistence.
Refreshing our technical deep dive into DNS exploitation which is still very relevant. Watch and learn how we uncover the entire process of finding and exploiting a vulnerability in a DNS parser. From zero to exploit, it's all here. Part1: youtu.be/xWoQ-E8n4B0
youtube.com
YouTube
DNS Remote Code Execution: Finding the Vulnerability 👾 (Part 1)
Here’s the talk I did for @syspwnx in the past as well if you missed it: m.youtube.com/watch?v=uBu9B0…
youtube.com
YouTube
SysPWN Session 1 : Alex Plaskett on Vulnerability Research and...
The recording of the second session of SysPWN with @RabbitPro from @FlashbackPwn on PWN2OWN Hacking Game is up on youtube! youtube.com/watch?v=qAn6B4… Sorry for delay in uploading! we were quite busy! Enjoy it!
youtube.com
YouTube
SysPWN Session 2: Radek Domanski from FlashBack team on PWN2OWN...
We're live now! cispa-de.zoom.us/meeting/638925…
Join us tomorrow (November 9, 16:30 CEST) with Another SysPWN Event with @FlashbackPwn team presenting "Pwn2Own, Hacking game" to see how they successfully found and exploited multiple vulnerabilities in different system for competing at Pwn2Own contest! cispa-de.zoom-x.de/j/63892507646?…

We're live now! cispa-de.zoom.us/meeting/638925…
Join us tomorrow (November 9, 16:30 CEST) with Another SysPWN Event with @FlashbackPwn team presenting "Pwn2Own, Hacking game" to see how they successfully found and exploited multiple vulnerabilities in different system for competing at Pwn2Own contest! cispa-de.zoom-x.de/j/63892507646?…

We'll be live in about 1 hour from now with @RabbitPro to learn from his experiences of Vulnerability Research for #PWN2OWN contests! Come and see awesome content from @FlashbackPwn Flashback team ! #SYSPWN #VulnerabilityResearch
Join us tomorrow (November 9, 16:30 CEST) with Another SysPWN Event with @FlashbackPwn team presenting "Pwn2Own, Hacking game" to see how they successfully found and exploited multiple vulnerabilities in different system for competing at Pwn2Own contest! cispa-de.zoom-x.de/j/63892507646?…

I will be talking about our experience playing Pwn2Own games, what kind of vulns together with @pedrib1337 we have been finding and I will provide a bit more technical details about 2 selected ones. Tune in especially if you consider p2o in the future 👇
Join us tomorrow (November 9, 16:30 CEST) with Another SysPWN Event with @FlashbackPwn team presenting "Pwn2Own, Hacking game" to see how they successfully found and exploited multiple vulnerabilities in different system for competing at Pwn2Own contest! cispa-de.zoom-x.de/j/63892507646?…

Join us tomorrow (November 9, 16:30 CEST) with Another SysPWN Event with @FlashbackPwn team presenting "Pwn2Own, Hacking game" to see how they successfully found and exploited multiple vulnerabilities in different system for competing at Pwn2Own contest! cispa-de.zoom-x.de/j/63892507646?…

📢📢📢Thrilled to announce @FlashbackPwn's presence in our upcoming #syspwn event on November 9, 2023, at 16:30 CEST! Radek (@RabbitPro) will discuss his pwn2own experiences, preparation, and how they tackled challenges in vulnerability research for #pwn2own contests!
📢📢📢 Excited to announce that we'll have FlashBack team @FlashbackPwn in our next session of SysPWN . @FlashbackPwn will present how they PWNed devices at PWN2OWN competitions . Stay tuned for our next announcement about the date and time of this event!
The recording of our session with @alexjplaskett on Vulnerability research and team building strategies for PWN2OWN competitions is up now! youtu.be/uBu9B0tNObs Enjoy it! #SYSPWN #PWN2OWN #Hacking #VulnerabilityResearch
youtube.com
YouTube
SysPWN Session 1 : Alex Plaskett on Vulnerability Research and...
Enjoy the session with Alex Plaskett! you can learn a ton from him .
The recording of our session with @alexjplaskett on Vulnerability research and team building strategies for PWN2OWN competitions is up now! youtu.be/uBu9B0tNObs Enjoy it! #SYSPWN #PWN2OWN #Hacking #VulnerabilityResearch
youtube.com
YouTube
SysPWN Session 1 : Alex Plaskett on Vulnerability Research and...
New Blog: SysPWN – VR for Pwn2Own research.nccgroup.com/2023/08/11/sys…
Alex released the great presentation he gave yesterday at @syspwnx . Again, we're grateful to @alexjplaskett and @NCCGroupInfosec for accepting our invitation and this contribution. The recording of the session will be available soon as well!
I have just released my slides for "VR for Pwn2" from @syspwnx talk I gave yesterday. Covering general P2O/VR experience, SoHo Smash-Up Ubiquiti and Lexmark printers. research.nccgroup.com/2023/08/11/sys…
Slides from @alexjplaskett talk at @syspwnx have now been released: research.nccgroup.com/2023/08/11/sys… Covering vulnerability research for Pwn2Own, Soho-smashup and printer vulns.
United States Trends
- 1. #VSFashionShow 119K posts
- 2. $CHA 1,215 posts
- 3. #KaneAI N/A
- 4. jihyo 72.4K posts
- 5. Nancy 104K posts
- 6. #TWICExVictoriasSecret 70.6K posts
- 7. Supreme Court 138K posts
- 8. Argentina 453K posts
- 9. Waddle 5,782 posts
- 10. TWICE LIGHTS UP VSFS 64K posts
- 11. Jasmine Tookes 1,775 posts
- 12. UTEP 2,407 posts
- 13. #TORQSports N/A
- 14. #MadisonVSFS 1,192 posts
- 15. Birdman 1,961 posts
- 16. Adriana Lima 8,603 posts
- 17. SCOTUS 43K posts
- 18. Banish 1,651 posts
- 19. tzuyu 63.5K posts
- 20. Big Balls 35.4K posts
Something went wrong.
Something went wrong.